@aws-sdk/client-kms 3.218.0 → 3.220.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (52) hide show
  1. package/README.md +12 -11
  2. package/dist-cjs/endpoint/ruleset.js +1 -1
  3. package/dist-cjs/models/models_0.js +206 -3
  4. package/dist-cjs/protocols/Aws_json1_1.js +284 -0
  5. package/dist-es/endpoint/ruleset.js +1 -1
  6. package/dist-es/models/models_0.js +187 -0
  7. package/dist-es/protocols/Aws_json1_1.js +285 -1
  8. package/dist-types/KMS.d.ts +457 -312
  9. package/dist-types/KMSClient.d.ts +12 -11
  10. package/dist-types/commands/CancelKeyDeletionCommand.d.ts +1 -2
  11. package/dist-types/commands/ConnectCustomKeyStoreCommand.d.ts +43 -17
  12. package/dist-types/commands/CreateAliasCommand.d.ts +1 -1
  13. package/dist-types/commands/CreateCustomKeyStoreCommand.d.ts +51 -13
  14. package/dist-types/commands/CreateGrantCommand.d.ts +1 -2
  15. package/dist-types/commands/CreateKeyCommand.d.ts +76 -35
  16. package/dist-types/commands/DecryptCommand.d.ts +16 -17
  17. package/dist-types/commands/DeleteAliasCommand.d.ts +1 -1
  18. package/dist-types/commands/DeleteCustomKeyStoreCommand.d.ts +21 -16
  19. package/dist-types/commands/DescribeCustomKeyStoresCommand.d.ts +22 -17
  20. package/dist-types/commands/DescribeKeyCommand.d.ts +7 -3
  21. package/dist-types/commands/DisableKeyCommand.d.ts +3 -2
  22. package/dist-types/commands/DisableKeyRotationCommand.d.ts +4 -6
  23. package/dist-types/commands/DisconnectCustomKeyStoreCommand.d.ts +12 -12
  24. package/dist-types/commands/EnableKeyCommand.d.ts +1 -2
  25. package/dist-types/commands/EnableKeyRotationCommand.d.ts +6 -8
  26. package/dist-types/commands/EncryptCommand.d.ts +11 -9
  27. package/dist-types/commands/GenerateDataKeyCommand.d.ts +1 -2
  28. package/dist-types/commands/GenerateDataKeyPairCommand.d.ts +8 -10
  29. package/dist-types/commands/GenerateDataKeyPairWithoutPlaintextCommand.d.ts +4 -6
  30. package/dist-types/commands/GenerateDataKeyWithoutPlaintextCommand.d.ts +9 -2
  31. package/dist-types/commands/GenerateMacCommand.d.ts +14 -14
  32. package/dist-types/commands/GenerateRandomCommand.d.ts +6 -3
  33. package/dist-types/commands/GetKeyRotationStatusCommand.d.ts +3 -3
  34. package/dist-types/commands/GetParametersForImportCommand.d.ts +3 -3
  35. package/dist-types/commands/GetPublicKeyCommand.d.ts +5 -4
  36. package/dist-types/commands/ImportKeyMaterialCommand.d.ts +8 -8
  37. package/dist-types/commands/ReEncryptCommand.d.ts +5 -5
  38. package/dist-types/commands/ReplicateKeyCommand.d.ts +5 -4
  39. package/dist-types/commands/ScheduleKeyDeletionCommand.d.ts +11 -8
  40. package/dist-types/commands/SignCommand.d.ts +8 -6
  41. package/dist-types/commands/TagResourceCommand.d.ts +1 -1
  42. package/dist-types/commands/UntagResourceCommand.d.ts +1 -1
  43. package/dist-types/commands/UpdateAliasCommand.d.ts +6 -6
  44. package/dist-types/commands/UpdateCustomKeyStoreCommand.d.ts +58 -38
  45. package/dist-types/commands/UpdateKeyDescriptionCommand.d.ts +1 -2
  46. package/dist-types/commands/VerifyCommand.d.ts +5 -6
  47. package/dist-types/commands/VerifyMacCommand.d.ts +6 -6
  48. package/dist-types/endpoint/EndpointParameters.d.ts +1 -1
  49. package/dist-types/models/models_0.d.ts +925 -224
  50. package/dist-types/ts3.4/endpoint/EndpointParameters.d.ts +1 -1
  51. package/dist-types/ts3.4/models/models_0.d.ts +166 -0
  52. package/package.json +1 -1
@@ -10,8 +10,8 @@ export interface SignCommandOutput extends SignResponse, __MetadataBearer {
10
10
  /**
11
11
  * <p>Creates a <a href="https://en.wikipedia.org/wiki/Digital_signature">digital
12
12
  * signature</a> for a message or message digest by using the private key in an asymmetric
13
- * signing KMS key. To verify the signature, use the <a>Verify</a> operation, or use the
14
- * public key in the same asymmetric KMS key outside of KMS. For information about asymmetric KMS keys, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html">Asymmetric KMS keys</a> in the <i>Key Management Service Developer Guide</i>.</p>
13
+ * signing KMS key. To verify the signature, use the <a>Verify</a> operation, or use
14
+ * the public key in the same asymmetric KMS key outside of KMS. For information about asymmetric KMS keys, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html">Asymmetric KMS keys</a> in the <i>Key Management Service Developer Guide</i>.</p>
15
15
  * <p>Digital signatures are generated and verified by using asymmetric key pair, such as an RSA
16
16
  * or ECC pair that is represented by an asymmetric KMS key. The key owner (or an authorized
17
17
  * user) uses their private key to sign a message. Anyone with the public key can verify that the
@@ -41,16 +41,18 @@ export interface SignCommandOutput extends SignResponse, __MetadataBearer {
41
41
  * information is required to verify the signature.</p>
42
42
  * </important>
43
43
  * <note>
44
- * <p>Best practices recommend that you limit the time during which any signature is effective. This deters an attack where the actor uses a signed
45
- * message to establish validity repeatedly or long after the message is superseded. Signatures do not include a timestamp, but you can include a timestamp in the signed message
46
- * to help you detect when its time to refresh the signature. </p>
44
+ * <p>Best practices recommend that you limit the time during which any signature is
45
+ * effective. This deters an attack where the actor uses a signed message to establish validity
46
+ * repeatedly or long after the message is superseded. Signatures do not include a timestamp,
47
+ * but you can include a timestamp in the signed message to help you detect when its time to
48
+ * refresh the signature. </p>
47
49
  * </note>
48
50
  * <p>To verify the signature that this operation generates, use the <a>Verify</a>
49
51
  * operation. Or use the <a>GetPublicKey</a> operation to download the public key and
50
52
  * then use the public key to verify the signature outside of KMS. </p>
51
53
  * <p>The KMS key that you use for this operation must be in a compatible key state. For
52
54
  * details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key states of KMS keys</a> in the <i>Key Management Service Developer Guide</i>.</p>
53
- * <p>
55
+ * <p>
54
56
  * <b>Cross-account use</b>: Yes. To perform this operation with a KMS key in a different Amazon Web Services account, specify
55
57
  * the key ARN or alias ARN in the value of the <code>KeyId</code> parameter.</p>
56
58
  *
@@ -10,7 +10,7 @@ export interface TagResourceCommandOutput extends __MetadataBearer {
10
10
  /**
11
11
  * <p>Adds or edits tags on a <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#customer-cmk">customer managed key</a>.</p>
12
12
  * <note>
13
- * <p>Tagging or untagging a KMS key can allow or deny permission to the KMS key. For details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/abac.html">ABAC in KMS</a> in the <i>Key Management Service Developer Guide</i>.</p>
13
+ * <p>Tagging or untagging a KMS key can allow or deny permission to the KMS key. For details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/abac.html">ABAC for KMS</a> in the <i>Key Management Service Developer Guide</i>.</p>
14
14
  * </note>
15
15
  * <p>Each tag consists of a tag key and a tag value, both of which are case-sensitive strings.
16
16
  * The tag value can be an empty (null) string. To add a tag, specify a new tag key and a tag
@@ -11,7 +11,7 @@ export interface UntagResourceCommandOutput extends __MetadataBearer {
11
11
  * <p>Deletes tags from a <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#customer-cmk">customer managed key</a>. To delete a tag,
12
12
  * specify the tag key and the KMS key.</p>
13
13
  * <note>
14
- * <p>Tagging or untagging a KMS key can allow or deny permission to the KMS key. For details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/abac.html">ABAC in KMS</a> in the <i>Key Management Service Developer Guide</i>.</p>
14
+ * <p>Tagging or untagging a KMS key can allow or deny permission to the KMS key. For details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/abac.html">ABAC for KMS</a> in the <i>Key Management Service Developer Guide</i>.</p>
15
15
  * </note>
16
16
  * <p>When it succeeds, the <code>UntagResource</code> operation doesn't return any output.
17
17
  * Also, if the specified tag key isn't found on the KMS key, it doesn't throw an exception or
@@ -12,12 +12,12 @@ export interface UpdateAliasCommandOutput extends __MetadataBearer {
12
12
  * only one KMS key at a time, although a KMS key can have multiple aliases. The alias and the
13
13
  * KMS key must be in the same Amazon Web Services account and Region.</p>
14
14
  * <note>
15
- * <p>Adding, deleting, or updating an alias can allow or deny permission to the KMS key. For details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/abac.html">ABAC in KMS</a> in the <i>Key Management Service Developer Guide</i>.</p>
15
+ * <p>Adding, deleting, or updating an alias can allow or deny permission to the KMS key. For details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/abac.html">ABAC for KMS</a> in the <i>Key Management Service Developer Guide</i>.</p>
16
16
  * </note>
17
- * <p>The current and new KMS key must be the same type (both symmetric or both asymmetric), and
18
- * they must have the same key usage (<code>ENCRYPT_DECRYPT</code> or <code>SIGN_VERIFY</code>).
19
- * This restriction prevents errors in code that uses aliases. If you must assign an alias to a
20
- * different type of KMS key, use <a>DeleteAlias</a> to delete the old alias and <a>CreateAlias</a> to create a new alias.</p>
17
+ * <p>The current and new KMS key must be the same type (both symmetric or both asymmetric or
18
+ * both HMAC), and they must have the same key usage. This restriction prevents errors in code
19
+ * that uses aliases. If you must assign an alias to a different type of KMS key, use <a>DeleteAlias</a> to delete the old alias and <a>CreateAlias</a> to create
20
+ * a new alias.</p>
21
21
  * <p>You cannot use <code>UpdateAlias</code> to change an alias name. To change an alias name,
22
22
  * use <a>DeleteAlias</a> to delete the old alias and <a>CreateAlias</a> to
23
23
  * create a new alias.</p>
@@ -27,7 +27,7 @@ export interface UpdateAliasCommandOutput extends __MetadataBearer {
27
27
  * in the account, use the <a>ListAliases</a> operation. </p>
28
28
  * <p>The KMS key that you use for this operation must be in a compatible key state. For
29
29
  * details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key states of KMS keys</a> in the <i>Key Management Service Developer Guide</i>.</p>
30
- * <p>
30
+ * <p>
31
31
  * <b>Cross-account use</b>: No. You cannot perform this operation on a KMS key in a different Amazon Web Services account. </p>
32
32
  * <p>
33
33
  * <b>Required permissions</b>
@@ -8,47 +8,67 @@ export interface UpdateCustomKeyStoreCommandInput extends UpdateCustomKeyStoreRe
8
8
  export interface UpdateCustomKeyStoreCommandOutput extends UpdateCustomKeyStoreResponse, __MetadataBearer {
9
9
  }
10
10
  /**
11
- * <p>Changes the properties of a custom key store. Use the <code>CustomKeyStoreId</code>
12
- * parameter to identify the custom key store you want to edit. Use the remaining parameters to
13
- * change the properties of the custom key store.</p>
14
- * <p>You can only update a custom key store that is disconnected. To disconnect the custom key
15
- * store, use <a>DisconnectCustomKeyStore</a>. To reconnect the custom key store after
16
- * the update completes, use <a>ConnectCustomKeyStore</a>. To find the connection
17
- * state of a custom key store, use the <a>DescribeCustomKeyStores</a>
18
- * operation.</p>
19
- * <p>The <code>CustomKeyStoreId</code> parameter is required in all commands. Use the other
20
- * parameters of <code>UpdateCustomKeyStore</code> to edit your key store settings.</p>
21
- * <ul>
22
- * <li>
23
- * <p>Use the <code>NewCustomKeyStoreName</code> parameter to change the friendly name of
24
- * the custom key store to the value that you specify.</p>
25
- * <p> </p>
26
- * </li>
27
- * <li>
28
- * <p>Use the <code>KeyStorePassword</code> parameter tell KMS the current password of the
29
- * <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-store-concepts.html#concept-kmsuser">
30
- * <code>kmsuser</code> crypto user (CU)</a> in the associated CloudHSM cluster. You
31
- * can use this parameter to <a href="https://docs.aws.amazon.com/kms/latest/developerguide/fix-keystore.html#fix-keystore-password">fix connection
32
- * failures</a> that occur when KMS cannot log into the associated cluster because
33
- * the <code>kmsuser</code> password has changed. This value does not change the password in
34
- * the CloudHSM cluster.</p>
35
- * <p> </p>
36
- * </li>
37
- * <li>
38
- * <p>Use the <code>CloudHsmClusterId</code> parameter to associate the custom key store
39
- * with a different, but related, CloudHSM cluster. You can use this parameter to repair a
40
- * custom key store if its CloudHSM cluster becomes corrupted or is deleted, or when you need to
41
- * create or restore a cluster from a backup. </p>
42
- * </li>
43
- * </ul>
11
+ * <p>Changes the properties of a custom key store. You can use this operation to change the
12
+ * properties of an CloudHSM key store or an external key store.</p>
13
+ * <p>Use the required <code>CustomKeyStoreId</code> parameter to identify the custom key store.
14
+ * Use the remaining optional parameters to change its properties. This operation does not return
15
+ * any property values. To verify the updated property values, use the <a>DescribeCustomKeyStores</a> operation.</p>
16
+ * <p> This operation is part of the <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key stores</a> feature in KMS, which
17
+ * combines the convenience and extensive integration of KMS with the isolation and control of a
18
+ * key store that you own and manage.</p>
19
+ * <important>
20
+ * <p>When updating the properties of an external key store, verify that the updated settings
21
+ * connect your key store, via the external key store proxy, to the same external key manager
22
+ * as the previous settings, or to a backup or snapshot of the external key manager with the
23
+ * same cryptographic keys. If the updated connection settings fail, you can fix them and
24
+ * retry, although an extended delay might disrupt Amazon Web Services services. However, if KMS
25
+ * permanently loses its access to cryptographic keys, ciphertext encrypted under those keys is
26
+ * unrecoverable.</p>
27
+ * </important>
28
+ * <note>
29
+ * <p>For external key stores:</p>
30
+ * <p>Some external key managers provide a simpler method for updating an external key store.
31
+ * For details, see your external key manager documentation.</p>
32
+ * <p>When updating an external key store in the KMS console, you can upload a JSON-based
33
+ * proxy configuration file with the desired values. You cannot upload the proxy configuration
34
+ * file to the <code>UpdateCustomKeyStore</code> operation. However, you can use the file to
35
+ * help you determine the correct values for the <code>UpdateCustomKeyStore</code>
36
+ * parameters.</p>
37
+ * </note>
38
+ * <p>For an CloudHSM key store, you can use this operation to change the custom key store friendly
39
+ * name (<code>NewCustomKeyStoreName</code>), to tell KMS about a change to the
40
+ * <code>kmsuser</code> crypto user password (<code>KeyStorePassword</code>), or to associate
41
+ * the custom key store with a different, but related, CloudHSM cluster
42
+ * (<code>CloudHsmClusterId</code>). To update any property of an CloudHSM key store, the
43
+ * <code>ConnectionState</code> of the CloudHSM key store must be <code>DISCONNECTED</code>. </p>
44
+ * <p>For an external key store, you can use this operation to change the custom key store
45
+ * friendly name (<code>NewCustomKeyStoreName</code>), or to tell KMS about a change to the
46
+ * external key store proxy authentication credentials
47
+ * (<code>XksProxyAuthenticationCredential</code>), connection method
48
+ * (<code>XksProxyConnectivity</code>), external proxy endpoint
49
+ * (<code>XksProxyUriEndpoint</code>) and path (<code>XksProxyUriPath</code>). For external key
50
+ * stores with an <code>XksProxyConnectivity</code> of <code>VPC_ENDPOINT_SERVICE</code>, you can
51
+ * also update the Amazon VPC endpoint service name (<code>XksProxyVpcEndpointServiceName</code>). To
52
+ * update most properties of an external key store, the <code>ConnectionState</code> of the
53
+ * external key store must be <code>DISCONNECTED</code>. However, you can update the
54
+ * <code>CustomKeyStoreName</code>, <code>XksProxyAuthenticationCredential</code>, and
55
+ * <code>XksProxyUriPath</code> of an external key store when it is in the CONNECTED or
56
+ * DISCONNECTED state. </p>
57
+ * <p>If your update requires a <code>DISCONNECTED</code> state, before using
58
+ * <code>UpdateCustomKeyStore</code>, use the <a>DisconnectCustomKeyStore</a>
59
+ * operation to disconnect the custom key store. After the <code>UpdateCustomKeyStore</code>
60
+ * operation completes, use the <a>ConnectCustomKeyStore</a> to reconnect the custom
61
+ * key store. To find the <code>ConnectionState</code> of the custom key store, use the <a>DescribeCustomKeyStores</a> operation. </p>
62
+ * <p>
63
+ * </p>
64
+ * <p>Before updating the custom key store, verify that the new values allow KMS to connect
65
+ * the custom key store to its backing key store. For example, before you change the
66
+ * <code>XksProxyUriPath</code> value, verify that the external key store proxy is reachable at
67
+ * the new path.</p>
44
68
  * <p>If the operation succeeds, it returns a JSON object with no
45
69
  * properties.</p>
46
- * <p>This operation is part of the <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key store feature</a> feature in KMS, which
47
- * combines the convenience and extensive integration of KMS with the isolation and control of a
48
- * single-tenant key store.</p>
49
70
  * <p>
50
- * <b>Cross-account
51
- * use</b>: No. You cannot perform this operation on a custom key store in a different Amazon Web Services account. </p>
71
+ * <b>Cross-account use</b>: No. You cannot perform this operation on a custom key store in a different Amazon Web Services account.</p>
52
72
  * <p>
53
73
  * <b>Required permissions</b>: <a href="https://docs.aws.amazon.com/kms/latest/developerguide/kms-api-permissions-reference.html">kms:UpdateCustomKeyStore</a> (IAM policy)</p>
54
74
  * <p>
@@ -12,8 +12,7 @@ export interface UpdateKeyDescriptionCommandOutput extends __MetadataBearer {
12
12
  * <p>The KMS key that you use for this operation must be in a compatible key state. For
13
13
  * details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key states of KMS keys</a> in the <i>Key Management Service Developer Guide</i>.</p>
14
14
  * <p>
15
- * <b>Cross-account
16
- * use</b>: No. You cannot perform this operation on a KMS key in a different Amazon Web Services account. </p>
15
+ * <b>Cross-account use</b>: No. You cannot perform this operation on a KMS key in a different Amazon Web Services account. </p>
17
16
  *
18
17
  * <p>
19
18
  * <b>Required permissions</b>: <a href="https://docs.aws.amazon.com/kms/latest/developerguide/kms-api-permissions-reference.html">kms:UpdateKeyDescription</a> (key policy)</p>
@@ -23,21 +23,20 @@ export interface VerifyCommandOutput extends VerifyResponse, __MetadataBearer {
23
23
  * signature.</p>
24
24
  * <p>You can also verify the digital signature by using the public key of the KMS key outside
25
25
  * of KMS. Use the <a>GetPublicKey</a> operation to download the public key in the
26
- * asymmetric KMS key and then use the public key to verify the signature outside of KMS. To
27
- * verify a signature outside of KMS with an SM2 public key, you must specify the distinguishing
28
- * ID. By default, KMS uses <code>1234567812345678</code> as the distinguishing ID. For more
29
- * information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/asymmetric-key-specs.html#key-spec-sm-offline-verification">Offline
30
- * verification with SM2 key pairs</a> in <i>Key Management Service Developer Guide</i>. The
26
+ * asymmetric KMS key and then use the public key to verify the signature outside of KMS. The
31
27
  * advantage of using the <code>Verify</code> operation is that it is performed within KMS. As
32
28
  * a result, it's easy to call, the operation is performed within the FIPS boundary, it is logged
33
29
  * in CloudTrail, and you can use key policy and IAM policy to determine who is authorized to use
34
30
  * the KMS key to verify signatures.</p>
31
+ * <p>To verify a signature outside of KMS with an SM2 public key (China Regions only), you must
32
+ * specify the distinguishing ID. By default, KMS uses <code>1234567812345678</code> as the
33
+ * distinguishing ID. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/asymmetric-key-specs.html#key-spec-sm-offline-verification">Offline verification
34
+ * with SM2 key pairs</a>.</p>
35
35
  * <p>The KMS key that you use for this operation must be in a compatible key state. For
36
36
  * details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key states of KMS keys</a> in the <i>Key Management Service Developer Guide</i>.</p>
37
37
  * <p>
38
38
  * <b>Cross-account use</b>: Yes. To perform this operation with a KMS key in a different Amazon Web Services account, specify
39
39
  * the key ARN or alias ARN in the value of the <code>KeyId</code> parameter. </p>
40
- *
41
40
  * <p>
42
41
  * <b>Required permissions</b>: <a href="https://docs.aws.amazon.com/kms/latest/developerguide/kms-api-permissions-reference.html">kms:Verify</a> (key policy)</p>
43
42
  * <p>
@@ -12,13 +12,13 @@ export interface VerifyMacCommandOutput extends VerifyMacResponse, __MetadataBea
12
12
  * KMS key, and MAC algorithm. To verify the HMAC, <code>VerifyMac</code> computes an HMAC using
13
13
  * the message, HMAC KMS key, and MAC algorithm that you specify, and compares the computed HMAC
14
14
  * to the HMAC that you specify. If the HMACs are identical, the verification succeeds;
15
- * otherwise, it fails.</p>
16
- *
17
- * <p>Verification indicates that the message hasn't changed since the HMAC was calculated, and
18
- * the specified key was used to generate and verify the HMAC.</p>
15
+ * otherwise, it fails. Verification indicates that the message hasn't changed since the HMAC was
16
+ * calculated, and the specified key was used to generate and verify the HMAC.</p>
17
+ * <p>HMAC KMS keys and the HMAC algorithms that KMS uses conform to industry standards
18
+ * defined in <a href="https://datatracker.ietf.org/doc/html/rfc2104">RFC 2104</a>.</p>
19
19
  * <p>This operation is part of KMS support for HMAC KMS keys. For details, see
20
- * <a href="https://docs.aws.amazon.com/kms/latest/developerguide/hmac.html">HMAC keys in KMS</a> in the <i>Key Management Service Developer Guide</i>.</p>
21
- *
20
+ * <a href="https://docs.aws.amazon.com/kms/latest/developerguide/hmac.html">HMAC keys in KMS</a> in the
21
+ * <i>Key Management Service Developer Guide</i>.</p>
22
22
  * <p>The KMS key that you use for this operation must be in a compatible key state. For
23
23
  * details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key states of KMS keys</a> in the <i>Key Management Service Developer Guide</i>.</p>
24
24
  * <p>
@@ -12,7 +12,7 @@ export declare const resolveClientEndpointParameters: <T>(options: T & ClientInp
12
12
  defaultSigningName: string;
13
13
  };
14
14
  export interface EndpointParameters extends __EndpointParameters {
15
- Region?: string;
15
+ Region: string;
16
16
  UseDualStack?: boolean;
17
17
  UseFIPS?: boolean;
18
18
  Endpoint?: string;